Sciweavers

386 search results - page 45 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
AAAI
2006
13 years 10 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
WSC
2008
13 years 11 months ago
An experimental study of an iterative simulation-optimization algorithm for production planning
It is well known from queueing and simulation models that cycle times in capacitated production systems increase nonlinearly with resource utilization, which poses considerable di...
Durmus Fatih Irdem, Necip Baris Kacar, Reha Uzsoy
ICLP
1997
Springer
14 years 25 days ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...
ENTCS
2006
154views more  ENTCS 2006»
13 years 8 months ago
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card
We present a semantics-based technique for modeling and analysing resource usage behaviour of programs written in a simple object oriented language like Java e code. The approach ...
Pascal Sotin, David Cachera, Thomas P. Jensen
OOPSLA
2007
Springer
14 years 2 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley